index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Industry Classification Decision Problems Integrity Clustering HIP Certificate Cryptography Domination Attack graph Machine learning Certificate-less PKI Costs Security C-ITS Identifying Codes Microcontrollers Software Certificate request Graph theory Industrial Environment Dynamic system Arabic Natural Language Processing Actuators Combinatorial optimization Boolean Satisfiability Problems Internet of Things Blockchains Bridge Complexity Machine Learning Sécurité Ethereum Internet of things IoT Dynamic attack graph CAM Computer crime Complexité Information dissemination Lattice-Based Cryptography Virtualization and Cloud Computing Dominating codes Servers Internet Data centers Complexity theory Polynomial Reduction Named Data Networking Risk assessment HSM Identifying codes Anomaly detection Cybersecurity NP-completeness Graph Theory Algorithm Wireless communication Cloud Computing User-Centric Identity Internet of Things IoT Functional Encryption WSN Dataset Finite fields Access Control Privacy Vehicular networks Resistance Physical unclonable function Countermeasure Industries Computer architecture PKI ETSI Hardware Simulation Apprentissage automatique Classification algorithms Hardness Misbehavior Detection IoT Demi-treillis à médianes Program processors Cybersécurité Uniqueness of Solution Complexity Theory Twin-Free Graphs OPC UA OpenID Blockchain Symmetric difference distance Connected vehicles Secure Elements Equivalence relations Protocols Authentication Communication V2X Graph Bent Access control

 

 

Publications avec texte intégral

129

Références bibliographiques

499

Open access

29 %

 

Collaborations par pays